Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Articles on Trending Technologies
Technical articles with clear explanations and examples
How does communication happen between Manager & Agent?
The manager sends a request to an agent, and the agent responds to the request, known as Request/Response interaction. The request is usually used to retrieve or modify management information associated with the network device.Requests which are generated by the manager can be as follows −Get request-PDU − In this manager generates a request for requesting information on specific variables.Get Bulk request Bulk − The manager generates a request for bulk information retrieval introduced in SNMP version 2. It allows the return of as much information as possible in a packet.Set request PDU − It creates or modifies management information ...
Read MoreWhat is the SNMP in the Computer Network?
SNMP stands for Simple Network Management Protocol. It is an Internet-standard protocol for handling devices on IP networks. Devices that typically provide SNMP include routers, switches, servers, workstations, printers, modem racks, and more. It is used mainly in the network management framework to monitor network-attached computers for conditions requiring regulatory attention.It is a framework for managing devices on the Internet using the TCP-IP protocol suite. It supports a set of fundamental operations for monitoring and maintaining the Internet.SNMP ConceptSNMP facilitates the concept of manager and agent. A manager, generally a host, controls and monitors a group of agents, usually routers. ...
Read MoreWhat are the functions of Network Management?
Network Management involves monitoring and controlling a network system so that it can operate properly without downtime. So, the function performed by a network management system are categorised as follows −Fault managementFault management is the procedure of technology used to manage the administrator who prevents faults within a networked system so that the availability of downtime is reduced by identifying, isolating and fixing any malfunctions that occur. It can support active and passive components to disavow fault.Configuration managementIt refers to the process of initially configuring a network and then adjusting it in response to changing networks requirements. This function is ...
Read MoreWhat is Network Management?
Network management is the procedure of administering, managing and working a data network using a network management system. Current network management systems use software and hardware to constantly collect and analyse data and push out configuration changes for increasing performance, reliability, and security.It involves configuring monitoring and possibly reconfiguring components in a network with the goal of providing optimal performance, minimum downtime, proper security, accountability and flexibility.FeaturesThere are various features of network management which are as follows −Network automationOne defining feature of a modern network management system is network automation. This is the procedure of automating the configuring, handling, testing, ...
Read MoreWhat is the POP Protocol in Computer Network?
POP stands for Post Office Protocol. It provides a standard mechanism for retrieving emails from a remote server for a mail recipient. For instance, suppose that a home user A usually connects to the Internet using a dial-up connection to an ISP.Suppose that another person, B, has sent an e-mail to A, when A is a net connected to the Internet. The email gets stored in the mailbox for user A provided by the ISP.When A connects to the Internet the next time and wants to see the new e-mail that has arrived, he opens his email client program. That ...
Read MoreWhat is MIME in the Computer Network?
MIME represents Multi-Purpose Internet Mail Extensions. It is a development to the Internet email protocol that enables its users to exchange several kinds of data files over the Internet, including images, audio, and video.The MIME is required if the text in character sets other than the American Standard Code for Information Interchange (ASCII). Virtually, all human-written Internet email and a fairly large proportion of automated email is transmitted via Simple Mail Transfer Protocol (SMTP) in MIME format.MIME was designed mainly for SMTP, but the content types defined by MIME standards are important also in communication protocols outside of email, such ...
Read MoreExplain the ATM Cell Structure in Computer Network
ATM transfers data in fixed-size units are known as cells. Each cell includes 53 octets or bytes, as shown in the figure. The first 5 bytes contain cell-header data, and the remaining 48 include the payload (user information).Small, fixed-length cells are well appropriated to transfer voice and video traffic due to such traffic is biased to delays that result from having to wait for a huge data packet to download, among other things.HeaderPayload5 Bytes48 BytesATM Cell FormatAn ATM cell header can be two formats, such as User Network Interface (UNI) or Network to Network Interface (NNI). The UNI header can ...
Read MoreExplain the TCP Services in the Computer Network.
Following are some of the services offered by the Transmission Control Protocol (TCP) to the processes at the application layer:Stream Delivery Service.Sending and Receiving Buffers.Bytes and Segments.Full Duplex ServiceConnection Oriented Service.Reliable Service.All the above mentioned TCP services are explained below in detail.Stream Delivery ServiceTCP is a stream-oriented protocol. It enables the sending process to deliver data as a stream of bytes and the receiving process to acquire data as a stream of bytes.TCP creates a working environment so that the sending and receiving procedures are connected by an imaginary "tube", as shown in the figure below:Sending and Receiving BuffersThe sending ...
Read MoreDifferentiate between Circuit Switching, Message Switching, and Packet Switching
Circuit SwitchingIn this approach, there is a dedicated route between sender and receiver. Before the link is determined in the circuit switching approach, the dedicated route will continue until the connection is eliminated.Message SwitchingMessage Switching is an approach in which a message is sent as a whole unit and routed by the intermediate hub at which it is saved and delivered. There is no installation of a dedicated route between the sender and receiver in the message switching approach.The destination location is added to the message. It supports flexible routing as the message is routed by the intermediate hub based ...
Read MoreWhat is Data Switching?
When a client creates the web or another computer network which is external to their current position, the messages are transmitted by the transmission media web. This method of shifting the data from one computer network to another network is called data switching.Switches can be called as an advanced form of the hub. They can provide the dedicated bandwidth at each node of the network that results in traffic passing through one node without affecting another node. It combines the hardware and software. Moreover, it contains enough intelligence to turn on or off a specific port through its software controls.Switching ...
Read More